This paper presents a comprehensive dataset of LoRaWAN technology path loss measurements collected in an indoor office environment, focusing on quantifying the effects of environmental factors on signal propagation. U...
详细信息
Converters rely on passive filtering as a crucial element due to the high-frequency operational characteristics of power *** filtering methods involve a dual inductor-capacitor(LC)cell or an inductor-capacitor-inducto...
详细信息
Converters rely on passive filtering as a crucial element due to the high-frequency operational characteristics of power *** filtering methods involve a dual inductor-capacitor(LC)cell or an inductor-capacitor-inductor(LCL)***,capacitors are susceptible to wear-out mechanisms and failure ***,the necessity for monitoring and regular replacement adds to an elevated cost of ownership for such *** utilization of an active output power filter can be used to diminish the dimensions of the LC filter and the electrolytic dc-link capacitor,even though the inclusion of capacitors remains an indispensable part of the *** paper introduces capacitorless solid-state power filter(SSPF)for single-phase dc-ac *** proposed configuration is capable of generating a sinusoidal ac voltage without relying on *** proposed filter,composed of a planar transformer and an H-bridge converter operating at high frequency,injects voltage harmonics to attain a sinusoidal output *** design parameters of the planar transformer are incorporated,and the impact of magnetizing and leakage inductances on the operation of the SSPF is *** analysis,supported by simulation and experimental results,are provided for a design example for a single-phase *** total harmonic distortion observed in the output voltage is well below the IEEE 519 *** system operation is experimentally tested under both steady-state and dynamic conditions.A comparison with existing technology is presented,demonstrating that the proposed topology reduces the passive components used for filtering.
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally ac...
详细信息
This advanced paper presents a new approach to improving image steganography using the Ant Colony Optimization(ACO)*** steganography,a technique of embedding hidden information in digital photographs,should ideally achieve the dual purposes of maximum data hiding and maintenance of the integrity of the cover media so that it is least *** contemporary methods of steganography are at best a compromise between these *** this paper,we present our approach,entitled Ant Colony Optimization(ACO)-Least Significant Bit(LSB),which attempts to optimize the capacity in steganographic *** approach makes use of a grayscale cover image to hide the confidential data with an additional bit pair per byte,both for integrity verification and the file checksumof the secret *** approach encodes confidential information into four pairs of bits and embeds it within uncompressed grayscale *** ACO algorithm uses adaptive exploration to select some pixels,maximizing the capacity of data embedding whileminimizing the degradation of visual *** evaporation is introduced through iterations to avoid stagnation in solution *** levels of pheromone are modified to reinforce successful pixel *** results obtained through the ACO-LSB method reveal that it clearly improves image steganography capabilities by providing an increase of up to 30%in the embedding capacity compared with traditional approaches;the average Peak Signal to Noise Ratio(PSNR)is 40.5 dB with a Structural Index Similarity(SSIM)of *** approach also demonstrates very high resistance to detection,cutting down the rate by 20%.Implemented in MATLAB R2023a,the model was tested against one thousand publicly available grayscale images,thus providing robust evidence of its effectiveness.
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conser...
详细信息
The fast growth in Internet-of-Vehicles(IoV)applications is rendering energy efficiency management of vehicular networks a highly important *** of the existing models are failing to handle the demand for energy conservation in large-scale heterogeneous *** on Large Energy-Aware Fog(LEAF)computing,this paper proposes a new model to overcome energy-inefficient vehicular networks by simulating large-scale network *** main inspiration for this work is the ever-growing demand for energy efficiency in IoV-most particularly with the volume of generated data and connected *** proposed LEAF model enables researchers to perform simulations of thousands of streaming applications over distributed and heterogeneous *** the possible reasons is that it provides a realistic simulation environment in which compute nodes can dynamically join and leave,while different kinds of networking protocols-wired and wireless-can also be *** novelty of this work is threefold:for the first time,the LEAF model integrates online decision-making algorithms for energy-aware task placement and routing strategies that leverage power usage traces with efficiency optimization in *** existing fog computing simulators,data flows and power consumption are modeled as parameterizable mathematical equations in LEAF to ensure scalability and ease of analysis across a wide range of devices and *** results of evaluation show that LEAF can cover up to 98.75%of the distance,with devices ranging between 1 and 1000,showing significant energy-saving potential through A wide-area network(WAN)usage *** findings indicate great promise for fog computing in the future-in particular,models like LEAF for planning energy-efficient IoV infrastructures.
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** the...
详细信息
The Internet of Things(IoT)has taken the interconnected world by *** to their immense applicability,IoT devices are being scaled at exponential proportions ***,very little focus has been given to securing such *** these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at *** have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in *** we propose a lightweight authentication protocol to provide proper access to such *** have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,*** define the architecture we used a three-layered model consisting of cloud,fog,and edge *** have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and *** also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human *** find that our protocol works the fastest when using ring learning with *** prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications *** conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
To maximize conversion efficiency,photovoltaic(PV)systems generally operate in the maximum power point tracking(MPPT)***,due to the increasing penetra tion level of PV systems,there is a need for more developed contro...
详细信息
To maximize conversion efficiency,photovoltaic(PV)systems generally operate in the maximum power point tracking(MPPT)***,due to the increasing penetra tion level of PV systems,there is a need for more developed control functions in terms of frequency support services and voltage control to maintain the reliability and stability of the power ***,flexible active power control is a manda tory task for grid-connected PV systems to meet part of the grid ***,a significant number of flexible pow er point tracking(FPPT)algorithms have been introduced in the existing *** purpose of such algorithms is to real ize a cost-effective method to provide grid support functional ities while minimizing the reliance on energy storage *** paper provides a comprehensive overview of grid support functionalities that can be obtained with the FPPT control of PV systems such as frequency support and volt-var *** of these grid support functionalities necessitates PV sys tems to operate under one of the three control strategies,which can be provided with FPPT *** three control strate gies are classified as:①constant power generation control(CP GC),②power reserve control(PRC),and③power ramp rate control(PRRC).A detailed discussion on available FPPT algo rithms for each control strategy is also *** paper can serve as a comprehensive review of the state-of-the-art FPPT algorithms that can equip PV systems with various grid support functionalities.
Purpose: The rapid spread of COVID-19 has resulted in significant harm and impacted tens of millions of people globally. In order to prevent the transmission of the virus, individuals often wear masks as a protective ...
详细信息
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeV...
详细信息
VPNs are vital for safeguarding communication routes in the continually changing cybersecurity ***,increasing network attack complexity and variety require increasingly advanced algorithms to recognize and categorizeVPNnetwork *** present a novelVPNnetwork traffic flowclassificationmethod utilizing Artificial Neural Networks(ANN).This paper aims to provide a reliable system that can identify a virtual private network(VPN)traffic fromintrusion attempts,data exfiltration,and denial-of-service *** compile a broad dataset of labeled VPN traffic flows from various apps and usage ***,we create an ANN architecture that can handle encrypted communication and distinguish benign from dangerous *** effectively process and categorize encrypted packets,the neural network model has input,hidden,and output *** use advanced feature extraction approaches to improve the ANN’s classification accuracy by leveraging network traffic’s statistical and behavioral *** also use cutting-edge optimizationmethods to optimize network characteristics and *** suggested ANN-based categorization method is extensively tested and *** show the model effectively classifies VPN traffic *** also show that our ANN-based technique outperforms other approaches in precision,recall,and F1-score with 98.79%*** study improves VPN security and protects against new *** VPNtraffic flows effectively helps enterprises protect sensitive data,maintain network integrity,and respond quickly to security *** study advances network security and lays the groundwork for ANN-based cybersecurity solutions.
The adversarial wiretap channel of type II (AWTC-II) is a communication channel that can a) read a fraction of the transmitted symbols up to a given bound and b) induce both errors and erasures in a fraction of the sy...
详细信息
The droop-free control adopted in microgrids has been designed to cope with global power-sharing goals,i.e.,sharing disturbance mitigation among all controllable assets to even their ***,limited by neighboring communi...
详细信息
The droop-free control adopted in microgrids has been designed to cope with global power-sharing goals,i.e.,sharing disturbance mitigation among all controllable assets to even their ***,limited by neighboring communication,the time-consuming peer-to-peer coordination of the droopfree control slows down the nodal convergence to global consensus,reducing the power-sharing efficiency as the number of nodes *** this end,this paper first proposes a local power-sharing droop-free control scheme to contain disturbances within nearby nodes,in order to reduce the number of nodes involved in the coordination and accelerate the convergence speed.A hybrid local-global power-sharing scheme is then put forward to leverage the merits of both schemes,which also enables the autonomous switching between local and global power-sharing modes according to the system *** guidance for key control parameter designs is derived via the optimal control methods,by optimizing the power-sharing distributions at the steady-state consensus as well as along the dynamic trajectory to *** system stability of the hybrid scheme is proved by the eigenvalue analysis and Lyapunov direct ***,simulation results validate that the proposed hybrid local-global power-sharing scheme performs stably against disturbances and achieves the expected control performance in local and global power-sharing modes as well as mode ***,compared with the classical global power-sharing scheme,the proposed scheme presents promising benefits in convergence speed and scalability.
暂无评论